industry verticals - News, Features, and Slideshows
A computer glitch that disrupted airline traffic in some parts of the U.S. over the weekend was possibly the result of a software upgrade, the Federal Aviation Administration said Sunday.
By John Ribeiro | 17 August, 2015 13:42
Infor made a $675 million bid to bolster its cloud and supply-chain management capabilities Tuesday with the announcement that it will acquire global order-management platform provider GT Nexus.
By Katherine Noyes | 12 August, 2015 03:40
As part of its plan to set up to 12 manufacturing facilities in India by 2020, contract manufacturer Foxconn Technology Group is investing US$5 billion in a factory and other facilities in the western Indian state of Maharashtra.
By John Ribeiro and Michael Kan | 10 August, 2015 13:51
Computer science and engineering students at Drexel University will have a new opportunity to use their skills for good with the launch of a technology program for promoting world peace.
By Grant Gross | 08 August, 2015 02:08
Tesla has issued a security update to its Model S car after security researchers discovered six flaws that allowed them to control its entertainment software and hijack the vehicle.
By Fred O'Connor | 07 August, 2015 06:01
Banks have been sending millions of Americans credit and debit cards equipped with computer chips to improve the security of in-store purchases.
By Matt Hamblen | 13 August, 2015 00:24
You may recall how the last tech bubble 15 years ago resulted in staggering market losses, numerous failed start-ups and increasing IT unemployment. Less noticed was the bubble's eerie correlation to undergraduate enrollments in computer science.
By Patrick Thibodeau | 27 July, 2015 20:10
Federal regulators are weighing reforms to widespread workplace wellness programs that could affect how personal data from consumer-grade fitness bands and smartwatches is kept confidential.
By Matt Hamblen | 20 June, 2015 02:25
The Apple Watch supports Apple Pay, but it's unlikely that the smartwatch, coming April 24, will significantly boost the number of mobile payments made by U.S. customers.
By Matt Hamblen | 02 April, 2015 22:06
If you think the latest enterprise and consumer network and computer technologies rolling into your data center and being snuck into your offices by end users are advanced, wait until you see what's cooking in the labs at universities and tech companies. Much of well-funded research is aimed at security, simplifying use of current technology and figuring out how to more easily plow through mounds of big data. Here's at peek at 10 projects.
By Bob Brown | 22 January, 2015 01:00
Research shows that 94% of CIOs believe that enterprise mobility has become an important part of their enterprise IT strategy. While there are many benefits for business, there are still risks when it comes to security. This whitepaper looks at the steps all organisations to take when it comes to supporting a mobile workforce.
- FTManual Test Engineer | Financial Institution | Web testingNSW
- FTLevel 2 IT Support TechnicianVIC
- FTMid level IT consultant | Systems Integration & Managed ServicesNSW
- FTAndroid DeveloperNSW
- CCMilitary simulation programmer with C# and Unity - 3 monthsNSW
- FT1st & 2nd level IT support all-rounder in beautiful rural BathurstNSW
- FTSystems Administrator | National commercial law firm | MS, AWS & eDiscoveryNSW
- FTField EngineerNSW
- FTSenior Consultant | Project work | National Systems IntegratorVIC
- FTSystems Administrator - Managed ServicesNSW
- CCE-Commerce - Senior Web Application DeveloperNSW
- FTLinux Administrator with AWS & DevopsNSW
Like a wildfire that quickly spreads as it increases speed and power, today's data growth increases the demand and management complexity of storage, backup and recovery. Imagine trying to stop that fire with a garden hose. Your legacy backup and recovery software is equally under-equipped to manage and facilitate operations that need more speed, efficiency, scalability and reliability to handle today's 24/7, always-on environment. Read about the benefits of moving from a solution comprised of multiple legacy point products to a holistic data protection platform designed to serve today's enterprise environment.
- Apple removes apps from store that could spy on your data traffic
- Alibaba sets up second data center in the US in $1B cloud expansion
- New California law requires warrants for access to private communications
- Many vulnerabilities in older Huawei 3G routers won't get patched
- New AWS tools give developers high-powered instances, better container support and more
- Qualcomm enters server CPU market with 24-core ARM chip
- Quick iPhone 6S case review: Ballistic Tungsten Tough
- AWS re:Invent 2015: Amazon aims to make AWS a better home for IoT devices
- Dell's next 'AFTE' software robot will offer cognitive intelligence
- Adidas to 3D print custom insoles in sneakers
- AT&T kicks off Wi-Fi calling years after T-Mobile
- AWS re:Invent 2015: AWS Mobile Hub streamlines app dev
- Microsoft's Surface Book to reignite OEM hostility
- Microsoft links Power BI to Alteryx for deeper analytics
- SHA-1 hashing algorithm could succumb to $75K attack, researchers say